Representatives working on security and intelligence issues and numbers of people sitting here are my friends on a bipartisan basis. Im very excited that we are doing something truly useful this morning, which is to host a Panel Discussion on security clearance, and nextgen overhaul. If you dont understand what nextgen means you probably should leave the room. Todays problems are digital. Too many of our policies and politicians are analyzed. Anyone who has held a secret or top secret clearance knows what i mean. Parts of our system fit the 19th century like the paper timecards we are stuck with it. Not kidding. Bottom line if we want a workforce with secure and talented our approach to security clearances needs an overhaul asap. The way we do business right now and at least three serious problems. First, we are not getting the right people in the door. More than ever we need individuals with Language Skills and cultural staff working in National Security but its too hard for a native arabic speaker to make it to the fbi. We also need folks who know their way around the keyboard as fbi director james comey has said its hard to attract that californias zerotolerance for past where one is. Second we are not catching the people that really deposed insider threat. But every think of Edward Snowden and i dont think well of Edward Snowden, if one can agree that was too easy for him to get the access he got. We have to get smarter about using big data, open source collection and behavioral analytics to fly possible Security Risks. We are getting smarter but are we getting smart enough . Third come after people make it into the system we are not securing their information. Thats a disservice to her dedicated Public Servants including some who are in deep cover even as we speak. We must do better. But the right approach we can and we have a phone on the panel here to suggest 21st century solutions. Introducing our speakers is a close friend, chris kojm. He recently a visiting professor at George WashingtonsElliott School of international affairs. He also contributed to a fabulous book on intelligence oversight that we are putting together with nyu Centers Center on law and security that will be released in from Oxford University press. Chris, before that had 25 years and he just calculated that, quarter of a century with my predecessor here served here for 12 years and before that all of you know the enormously valued chairman of the House Foreign Affairs committee and recently received the president ial medal of honor. Chris was on the House Foreign Affairs committee for 15 years and worked on the Iraq Study Group and was Deputy Director of the 9 11 commission. Please join me in welcoming him now. [applause] thank you. With profound thanks to the Wilson Center and president hartman for sponsoring todays discussion. I believe deeply if we have a National Debate on this question that the views you here today will prevail. The case is compelling. Its my honor and pleasure to introduce the members of the panel. First i want to start directly to my left the honorable charles e. Allen who currently serves as the Security PolicyReform Council chair of the intelligence and National Security alliance and for the past six years has been a principal at the chertoff grew. It would be remiss for me to stop their. Mr. Allen has 50 years of government service. He served as undersecretary at the department of Homeland Security and assistant secretary before that. He was the assistant director of Central Intelligence for collection. He and i worked closely and i have the highest regard for him. Further, to my left is the honorable joan dempsey. Formerly she served as the Deputy Director of Central Intelligence for Community Management under president clinton and the executive director of the president for intelligence of advisory board. Given her experience is the director of National Intelligence. Moving to my right here immediately to my right is the honorable randall fort in the cyberdomain team at raytheon corp. And assistant secretary of state in the bureau of intelligence and research at the department of state, a very fine organization. All the way to my right is Douglas Thomas who is the director for counterintelligence operations and Corporate Investigations at lockheedmartin. Hes the principle decade deputy, served as the principle Deputy Director for counterintelligence and the u. S. Government. He has 35 years of Service Working on counterintelligence issues in the chair the National Counterintelligence operations force. So the case i put two of you is that the experience and the depth of perspective for those represented on this panel i think deserve attention. With that quietly began with the first question and the question is why do we need security clearance reform . Just as simple and straightforward as that. I will ask everyone to speak for roughly three minutes for the question on i will begin with randy fort. Thank you kristen thank you jane for hosting this event with a the think is an important dialogue to have. Im curious people in the audience here how many of you drive a 1950s automobile today . Anybody . Does anybody in the audience have a 1950s telephone that you use . Is there anybody here whose Television Set is a 1950s model . Anyone . When you go to the dentist do you expect a 1950s dentistry or are you looking for something a little bit more advanced . Okay, so the 1950s as a Business Model is pretty much over except in the security clearance business area which is still mired in that decade in terms of the fundamental processes and mindset of how security is done. There is this hand tool, we will go around and knock on doors and talk to people who dont even know who you are an check those boxes and assume that somehow that is yielding something when it does not. And for many many years that process is all but oblivious to the changes in technology. Its not surprising the federal government was slow to recognize and respond to the revolution in the 1980s. They were slow to recognize and respond to the World Wide Web developments in the 1990s. They were slow to recognize and respond to the social media revolution taking place in early 2000 and we are seeing the same pattern today when it comes to mobility so not a lot of ability to grasp and understand the impact of influences of these technologies which continue to double relentlessly in their capacity every 12 to 18 months. So we have a system today that is old, it is an efficient and it is ineffective. It is obsolete. It is slow, it is inaccurate and as we have learned with the opm announcements over the last several months is corrupt. We cannot even trust the information which is held in the various databases at this point because foreign powers have allegedly had access to that, not just thinking about whatever whatever whatever they been able to do to manipulate us so we are looking at a broken system. Its fundamentally broken and unreliable so this should be the opportunity to recognize that it is 2015 and in a few weeks a would be 2016. We are 15 of the way through the 21st century and yet we still are relying on the system which is mired in the middle of last century. I think there theres a pretty good case to be made that its time to start looking toward the future and new technologies and figure out a better way to do business. Thanks randy and i just wanted to mention that we are live on cspan. Next i would like to turn to charlie. Thank you chris. The pleasure to be the Wilson Center again. I think what randy is just outlined sort of sets the stage iv the rest of the discussion here and abroad framework that we have to use new and better technologies. When i was at the cia the security clearance process is worked reasonably well, trying to transfer an essay cleared officers and get them assigned to my staff. Almost took intervention by the executive director or by john dempsey to make things happen. When i went to the department of Homeland Security where is the undersecretary to secretary chertoff i found the process different and very slow and difficult. So when i left government in 2009 it was my view that it was vital to the intelligence and National Security alliance as the Senior Adviser through Ellen Mccarthy was president i really want to form a task force in that task force has turned into a more permanent body. Why . Because we found the problems were very difficult. We found there were greater efficiencies in the way we did business, that the cost for extremely high, bad weather and government because the intelligence and perform in terrorism and prevention at the office of personal management in 2005 took over from the department of Defense SecurityServices Plus their responsibility for security clearances. The processes in government did improve because it did mandate some really expedited processes for clearing the government site that i found on the contractors side we have tens of thousands of contractors. We would not have Weapons Systems and we would not have payloads in space if we didnt have contractors with great specialties. I found, we found that was extremely slow and very difficult and the government really was moving at glacial speed. Part of the problem was people who had clearances, it was mandated that they have periodic investigations every five years and we have a huge back log when the office of personal management took over the responsibility. It had been worked on hard by jim clapper who at that time was the undersecretary of defense and intelligence but it was improved. The government site in the contractors side. And he given time, he published a paper in december of 2011 that said 10 to 20 of contractors who were to be put on a contract could not work because there are periodic investigations were out of date. That caused literally billions of dollars when you think of the vastness of the department of defense Intelligence Community and Homeland Security. I found it very staggering. I have one experience where we had a topsecret cleared officer from bia who was born, had relatives in vietnam. He had been polygraphed for counterintelligence. I just wanted to transfer him from dia to the department of Homeland Security. We waited nine months to get that clearance past and approved by the director of security over at Homeland Security. That was when i arrived at the intelligence National Security alliance, i had this earning a share in this burning issue now turned into a council. The current a Permanent Council subcommittees and im honored that we have both randy fort hira who has worked on this and doug thomas who is working today on a new subcommittee on the insider threat. So it has expanded in its become permanent and improvements have been made that we have oceans and notions of places to go before we have efficient policy and security do not align. Acquisition and security do not align. So that is sort of the background. I wanted to give a little history before we move on in our discussion. Thank you charlie and i would like to turn to john please. Thanks chris but i want to pick up on a couple of things but i certainly agree with the way randy put the challenges today in context. Hes absolutely right, we need a new approach to personal security inside the government. I also want to pick up and get a couple of examples of what Charlie Allen was talking about. Government like most successful organizations have to Pay Attention to costing cost is a big driver but the cost of personal security for a boy the government doesnt know what personnel security cost us so i have a couple of specific examples or want to give you this morning and while the story is true the name was changed to protect, wellmade because its privacy information but Everything Else in the story is true. John smith is a technical expert in quantum computing. Its very hard to find american citizens who are willing to subject themselves to security clearances and work for the government. He then expert in quantum computing cleared at the information level within the department of defense and he is projected to be built for the government at 195,000 annually, very specialized skills, an individual with a very high clearance. That number breaks down to 15,000 per month, 3750 per weekend 93. 75 per hour. John is scheduled to move from one Intelligence CommunityOrganization Contract to a different Organization Contract. Remember he is fully cleared. His clearance has been submitted to the Gaming Agency so that he could be crossed over to work on a new contract. His company will carry the cost of employing john, roughly 15,000 mothers are set for this highlyskilled highly educated individual for the duration of the crossover. Matt. Who ultimately pays that though . Of the u. S. Government because that caused is embedded in the rate that the government pays for those individuals. The agency to which john is moving is only to execute a polygraph to move him. We estimated six months for the crossover. Unfortunately it took to 10 months and we paid 150,000 to keep john on what we call the bench while we waited for his polygraphed to be scheduled, which it was but we didnt know during that time whether or not it would be so as a huge cost for one individual that was a fairly simple process. The second one is a little harder. We had an individual who is also cleared by the department of information with a they polygraph but who was married to a foreign national. His wife was indian. He was in he was an advanced Technology Office at dod and we wanted to move him to an icy advanced Technology Office. Now he had a bachelors of science in Electrical Engineering from the California Institute of technology and a ph. D. In applied and Engineering Physics from cornell university. There arent a lot of american citizens that have those qualifications. He was also the author of more than 40 technical papers with over 5000 citaons. He was fully cleared, his clearance took 294 days to crossover because he had an indian born wife. She got american citizenship before his clearance crossed over and she started the process after we submitted his paperwork these are two individuals out of the thousands of contractors who do highly specialized, highlyskilled information for the Intelligence Community. We have to fix this problem. With that i will turn it over to chris. Thank you joan and doug. Thank you chris. Good morning. One thing we are going to see is that we need to start levering levering leveraging technology. I think one of the things that has changed, the threat environment has changed in 50 years. Somebody mentioned earlier that scott is a big deal and ensures up my spine because this is about the bad guys have much more information than they ever have before. Its going to make our job a lot harder. I look at this panel and no offense anybody but its decades of experience in the government. Looking at this problem i think all of us could probably be a little bit embarrassed as to why we are where we are today because as randy said andis jones said andis charlie said we have been approaching this problem for 50 years now. It is time to start leveraging technology on the front end when you get clearance and throughout the whole process of having clearance. Thanks doug and i will just finished up with a few points as to why we need reform. Secret clearance costs 400. Top secret security clearance costs 5000. The direct cost to security clearance in any given year are 1. 6 billion. Thats a lot of money. We do hundreds of thousands of clearances each year. If we use technology guess there will be a cost up front but the cost of doing those clearances and monitoring people Going Forward is the cost of bank transaction. Is it tiny fraction. Thats the model we need to move to. Okay, so lets start the next round and that i want to turn it back to doug. What changes do we have to make . Doug is in the middle of making them so he is our speaker to start. Im trying to remain optimistic. Following the opm report the 90day review study in the principles are being briefed from it this week, im hearing that they are going to stand up a new agency called the National Investigative service agency. Im not sure where its going to land. Its going to have a new director and a new focus. Im trying to remain optimistic about that. What really needs to happen is like a mentioned earlier on the front and we probably need something before we hire somebody relative like the Insurance Companies do and the Credit Card Companies do, give a risk score on somebody. I think what you need to have this continuous valuation of the people that you grant a a clearance to who by virtue of that has access to our it is not that hard. We have been been doing in an organization for the last few years and quite frankly some people might be concerned about the cost up front. They are not that big of a deal but the money you save over time with continuous evaluation 24 7 on your employee evaluation is phenomenal. Okay. Why dont we turn to randy. First of all lets acknowledge the government just needs to come its like going to aa or or something any technology or problems of the problem is this terribly obsolete system which is simply ineffective. The second thing is to make a clear decision that we are going to move forward with the Technology Platform to solve this problem. The numbers that are being used here, hundreds of thousands or millions, Something Like a total of 10 Million People government and contractor have some form of clearance. That number is a ballpark but when you go to the private sector thats a small number. 10 million is not a big number if you are a visa or an American Express or mastercard or insurance company, fewer amazon or google. 10 million come if you were actually their system with papa would have to dumb it down to get to a number as small as 10 million. So this is something where theres a lot allergy that is available. We were hearing about the days, weeks, then sometimes years to get these issues done. Security clearances should take a fraction of a second. How long did it take when you take your visa card swipe at a pointofpurchase . You stand there and wait for a green signal to come back legs now, comes back later when you think of the night because the databases are being queried by sophisticated algorithms that are doing a lot of data correlation literally in fractions of a second. All this issue of crossover and periodic review, the delay of all these things, security clearances took one second and if they cost 1 cent then we could all get security clearances dozens of times a day because it would matter. We have to figure out how to use the technology to change the fundamental picture of the way the process is go forward. I think yes there will be upfront costs. You have to pay a certain upfront cost to come up with that i. T. Layer two all of the other Technology Companies have to do that. Thats an investment. A 1. 6 billion, im betting thats off by an order of magnitude. Doesnt count for the delay in the downtime of all the people sitting in twiddling their thumbs waiting for their clearance to come through. That is billions and billions of dollars being wasted in time, value and money thats never catch elated. Moving to complete digital platform and yes there will always be two or 3 of individual cases that will require some handson treatment if somebody went off in went to a when they were 22 years old and that will take extra attention. The vast majority of the population we are talking about could he done using in all of digital modern technology that would give you a considerably greater insight into the behavior and the future behaviors and algorithms are becoming predictable. Google knows if you are getting sick before you know youre getting sick. Target knows you are pregnant before you know are pregnant and they know where your owing to be tomorrow based on where you are today based on Data Technology will keep doubling every 12 to 24 months as we move forward. The capabilities will become increasing glee predicted and we will be able to play is not an in the mannings not after they train over the court and have annihilated it. So we will actually and up with a much more secure outcome and security dividend once these things are implemented. Thanks randy. Joan. A lot of them have spent time and effort and money trying to do it. We have had a lot of reform initiatives but i think what we have never come to grips with his pc security as really a supportive function. We dont see it as inimical to getting our job done or allowing us to get the job done if its done correctly. If we treated personal security is a Mission Rather than as a demonstrated function that we have to deal with, then i think we would be able to spend the money and solve the problem. We are pretty good at solving mission problems in the ic but because we dont think of it as something that either hinders or helps our mission we dont treated with the same seriousness as we do mission issues, so i think thats philosophical issue really affects us and our ability to deal with this problem. Thanks joan. Charlie. I want to reinforce what has been said by other colleagues here. We are in a new era and we have the technologies. Continuous monitoring is something the director of National Intelligence supports. Certain agencies like the cia and nsa are moving ahead so that realm as well as others in the Intelligence Community and the department of defense of course which is a very vast population of people who are topsecret. But the progress is quite slow. I think we have to a line of policy level as well as the security levels as well as the contracting because today its segmented, separated and the Security Officer or chief information Security Officer that monitors network seems far removed from some of the very rapid and more efficient ways we could do this. And i trust the judgment of essentially independent agency will be stood up to replace with the office of Personnel Management did pay the office of Personnel Management did not have the infrastructure, capabilities or resources i think when this was decided back in 2004 and this responsibility in 2005 to execute this. They did not have the security. They did not have the counterintelligence expertise to handle the problems we face today. That is a given. It is my strong belief however that we have an opportunity now not to build then if there is an independent agency or assuming an independent agency all the vulnerabilities of the password policy, security and the whole practical business of doing security clearances seem to be separated and divided. They have to be a unified way. 2008 there was a performance accountability board established and under this administration there has been continuing efforts to find efficiencies. Generally as we have seen from the snowdon and manning events and the davis event at the navy yard we have not been very successful in doing all of this. I think right now i am updating my top secret sci clearance. Andone will interview me read back the 120 god pages. It could say, is this correct or incorrect, that seems to me, obsolete. Society, and you dont know your neighbors the weight he used to of the neighborhoods, as we once did. Technology for choirs a little bit of Risk Management, but it does take unification between security gurus and the policy decisionmakers. Lets hope we have embarked onal a new generation or way of doing security clearance reform. Let me round out talking about the process of security reinvestigations. Let me round out to talk about the process the security investigation. Your sister rhea be reinvestigated every five years if you have topsecret nerve secretary moniz with the secret that isnt effective because peoples behavior changes things happen to people over time there are changes in relationships, the drugs, alcohol, personality changes and in our Current System there is no way to check on people unless it is a 10 Year Anniversary the system of continuous evaluation and others to identify problem employees frankly most of them will not be spies but people who have trouble in their personal lives that will lead them from verbal more verbal by hostile powers. So to identify the problems so the health and services that you need to be back contract and to help protect our people we can protect our secrets better than we do today. Moving on to the next round of questions what has to happen for these ideas to be successfully implemented by all parties . To secure the never is critical. To enhance technology to continue the evaluation throughout the entire process. Were not trying to find a cure for cancer not solving peace in the middle east this is not the dark by a heart problem at this minute to solve 99 percent of the problem and i have been contributing and of those have participated we have the solution set out. With continuous evaluation they figure how to into the privacy issues but if they just took the lockheed model to implement it will agree orders of magnitude more secure today than yesterday. But for decades this is not this is not have to get to the moon and those that would be willing to do that. That is leadership we have to get Senior Leaders involved in the top two or three things they will do. For all those reasons every really do people are the most important asset to come up with a system that will better protect the people with the challenges and threats better against them and if somebody has an issue to identify that early on to get a good person back contracts so we dont have to go through the worst case where we spend billions of dollars of Damage Assessment to take adverse action with the energy we burn up to do that. It is only because to better serve the People Better working in these agencies or organizations for the that is the best reason to go forward and do so with alacrity. M1 to reinforce what they have said. It is a matter of policy but meeting prior to this formal session to have to improve the business process with the Security Side so with strong great leadership will take intelligence and with this administration and the new one to begin to change just but i agree to do the checks on people when theyre updated. So with that Security PolicyReform Council to demonstrate that certain crossovers some agencies to crossovers 70 agencies that you think youre doing crossovers would do in a hurry so a change in the policies to update the policies to find ways for other individuals never when the parents are bored or died. [laughter] select everybody has captured this perfectly it isnt about reform and a fundamental change that is personal security is essential to accomplish but as a mission problem we can solve the problem. So how to successfully implement so when you have a background check to apply for security clearance you agree to have your background investigated the nature of that investigation to the 21st century so instead of 127 pages of forms with your dead relatives to submit your neighbors and colleagues to move to a digital Background Investigation. It should only be publicly available data. At this endeavor looks to data records to assemble an integrated and analyze it is a powerful tool stoloniferous get their clearance as continuously as those mitt thereafter so on that score amazon and google knows more about you with those very sophisticated data bases they know a lot about you. Those entrusted with the nations secrets should be analyzed to protect our secrets. Any more comments . Well let willingly decided to disclose access the one she lovelorn if it is accompanied one of the true heroes in the security reform area from the u. S. Army managed to get a Pilot Project undertaken to look at a subset of the overall population to look at their online behavior so once you do that you log on to another account there is no expectation of privacy. I will not get the numbers exactly right the 125 people that work with the five years because they found serious violations but then to kill his wife from his military address another one said where can i score pot . There was an issue those ever instantly suspended for access because they took a look what is going on digitally the they had never looked at before that was one tiny example so these tools are very powerful. If we leverage this technology will get more insight. Yes. Absolutely so they have successfully resolved that. To do things that is respectful and if anybody that has been i have spent half of my time with those documents the list of everything you are waiting but now we just take that into the 21st century. S. A. Digital investigation Going Forward. A very good discussion by all of you. For a half years into the job ahead failed. [laughter] but the very little mention of my former employer of the United States congress. How much does or how little can congress do to have the same vision ocher . That is a great question. And makes that a priority. With that to the First Century platform it will drive the process. The problem is still a little public discussion. No public debate. The public discussion help drive change semester a threat here at the Wilson Center. Is great to be here with a terrific discussion for you are all aging gracefully [laughter] you made the point Intelligence Community is behind the Technology Curve by 50 years. Ive that. Put the issues we have known about this for least three years. And some of those issues that you raise about the cost also the loss of expertise. We are working on that 25 years ago also. The point that i would make is we have slipped back from where we were because were dealing with this strong headwind thy was surprised to learn the agencies dont except each other security clearance. And that adds to the cost. With a polygraph and the cia will not accept it. That i totally agree with regard to the alignment Community Look back at the congressional levels to spend any money that will fix them. And for very well with the inefficiencies of the Current System. But what happens to the leaders while there are inefficiencies what we do discover to protect us is not worth the risk of changing. Edison the alignment of leadership between the white house and the congress. Congress doesnt pick up this issue. For the leaders of the Intelligence Community dont buy into the change that is necessary. I will respond to what he had to say because he is spa on in this historically correct losing ground so to move at glacial speed to modernize our process or policy. Spending three years to decide 2011 through 2014 i could be wrong on the dates with fairly elementary stuff. So with the defense communities the administration and congress is lacking. And as we point out interest from staffers the very little leadership on this issue on the komen Security Committee there is a lot of politics of those defensive republicans in the administration and here we have a major thing my wife to scott her letter from 0 00 p. M. On friday because as personally as identifiable information about her after putting in might s f 86 to what they talk about so strongly. You are absolutely right the other area of similar dysfunction affecting the contractor world is on the acquisition side. Both security and acquisition our rule based process and the environment it evolves over 56 years and it is very hard to get off of that with very important functions the government needs done. I would agree 100 percent i have seen it backfire with the bipartisan in a bicameral parts of the government working together you begin to despair we can do this. Talk about entities and the white house and Intelligence Community you would be very surprised how far along the companies are with regards to solving the problems that. The Fourth Amendment applies to the governments involvement with the citizenry not my employers. There are things we can do in the private sector to move this problem further down the road. A very important discussion with the topic of great concern regarding though lost of productivity of taxpayer dollars with a security clearance process. So two years ago the reauthorization act for fiscal 2014 of title five if of authorization legislation requires the idea and i that the Continuous Monitoring takes place with clearance reciprocity. Passed into law almost two years ago it is an item of concern on the hill. Maybe that is akin to cybersecurity with the officer and not the ceo that is why until there is a breach and then the ceo has to resign. And not know what else it takes to get that level of prominence and dash you pointed out to talk about the cost and maybe it is the new agency. Maybe that is the first step with the bifurcation between the Intelligence Community that is concrete what congress can do. It is clear they have made their views known on this. With their needs to be an additional amendment to the next authorization it could be done in six months so to allow for the usual crunch time. By june reversed of 2018 the Intelligence Community shall employ a fully digital, automated, secure Background Investigation system for government contractors. Now this new agency of to start to walk this back what do i need to do today . Syllable of saying it you know, youre going to be hanged you concentrate wonderfully. [laughter] and the mine would become concentrated there was a date now they can stay with your team hearings how is it going on the deadline . Anything we n do to help. Iran i hate that i dont Like Congress to micromanage anything. And to do this because it is the right thing to do. And with risk aversion. Dont you doing the same thing over and over. It can take some leadership to be the action forcing event. Recalling the legislation. The director of National Intelligence believes strongly with various projects m process these we still dont move fast enough. But at the same time that were planning a spring event and then to speak of the importance nmb will be in touch with you. There is a lot of frustration but yet in the aftermath of the watershed moment it was a 300 Million Contract so its not that we cannot act in an emergency but we choose not to. To talk about the divergence of those actions. Since you have government experience. Ed is a good point shortly after the breach happened a couple of us wrote the oped it had to do with what we were reading is seem to be much more on Identity Theft that had nothing to do with Identity Theft everything to do with the nation state and my concern with that but this is a 30 year problem to keep people excited about this breach it will be somewhat difficult. Diamond attorney i am an attorney. And i have known him the whole life. And sent an email to congratulate him. He was pleased to be named president ial medal of freedom. I am happy to be here today im a victim of a process but i have testified some years ago before congress with the subcommittee of the process to do a Background Investigation on me. But they simply stopped the process so they created of file that contains obnoxious information and i never got the chance are you a loyal american . And i have information to have the opportunity to comment that they simply stopped in mid stream. So those are the terrorists but someone like me it did not work for me there. I am a Security Risk . The cost are astronomical. Over the right to participate but i could put a face on what is wrong with the system. Thank you. I am the beneficiary attacks defense Intelligence Community participant. But with some of those illustrations how much risk we are willing to bear. Ive understand it will drive policy changes Going Forward but with those algorithms is the notion of risk and that deals with the issue of trust that all your much of the notion of the ultraconservative counterintelligence and how to overcome that if you drive that forward with automation. Is a good question since hitting a program is not that much different. They have strong privacy concerns vided is set up a program with the privacy side is a team sport with a privacy at the top of that issue and what the program does but doesnt do any profiling of people at all. And together we make a decision if we act on that. Is all objective and publicly available the subject of intense and what do you do with that of affirmation and . Were trying to look out for the employee if you think of Workplace Violence the had behavior in somebodys life but looking up for that behavior is to act on. Can be transferred that thought process . Left to its own devices we talk about Risk Management the most they will ever accept for personal security is zero every single time. With the executive leadership has basically listen and. So there has ben scorers of spies so there has always been failures fees and aberrant behavior that has gone on so to use at as an excuse is going is ridiculous said to have real Risk Management said to have that decision based to attend those meetings once a month whether we willing to except . How does that allow us to have better insight to figure out to set the standards for these things. Here is what we have decided what you think . There always been those who slip through the net. Right on down the list. It will also give us more truly security at the end of the day and you get on with the new process. If we do leverage these technologies we will see a change to talk about the ultraconservative counterintelligence they have a real responsibility. So there is the enlightenment with the value of cia. Adjust one comment on the question but to ensure his not only the United States of america the toolkit digital evaluation tools with Government Employees ended is important before other people take action. The white paper we put out with a counter Intelligence Community did not believe a single word we had to say the rest of the world did. Then you better understand for the attacks of the chinese and the iranians that should be predicate enough. The woman in the back. What is Continuous Monitoring . And how the employees are trained but eyelet get more with those to stem the for the entire threat abide the Leveraged Technology we went out with very Robust Communications because to build National Security is to their benefit and then to engage is not your call the snitch. The for the companys current benefit some of that has to do with the network so that is the Human Behavior baseline. It to believe or a bankruptcy i think selling death building a program is that in one with the corporate values . What we have done is build a program along those lines. Rose 96 pages of only five pages. [inaudible] when i rarely not an expert there is classified information but dont have the experience of the u. K. Close intelligence to have similar systems that were along the same lines so that is an interesting idea to check with the allies to see how they do business. I get it. I do have some allusions if we have one new ones with the straitlaced presbyterian. With eight abdication of the exotic dancer. So as to have those types of examples have the classified study including the adjudication with whatsoever. So with your socalled friend who doesnt like you had said during the interview process i am very surprised. It is very premature. You can set the parameters in the we won but to set that digital model is the big data sets with the much richer basis of data so anyone who has Intelligence Community access ended is unique to you by is unique to me. So if you deviate from that norm than a light goes off why is that . There is the crisis you were called in. May be your supervisor says i dont know. So that is the situation. And for a deviation those patterns versus someone trying to buy a carolyn or ecstasy but you cant be spoke those parameters that will have more clarity. And then to have a human but is trained to understand the technology to make human judgment were at the end of the day to have a due process. The only takes you so far down the road so plugged in end let her do her job. One of the Success Stories with those adjudication for those who never had a clearance before. Unless theres an extensive overseas time so those that we would like to have the cultural understanding it is almost impossible to get them through. To be strung along via the process. The reason i am here before you today because there was a boiling point with a grandmother in the former soviet union it did them for years to declarants. That is not a good Business Model for government or private sector or anybody. I am thinking that this since the companies have to not Pay Attention to yet this pressure with the backlog by the investigations. In the past the digital approach is there were pressures to go to the office of Personnel Management with those periodic investigations. So if that occurred with the process through 0 00 p. M. But frankly i believe of where we have to be in the future those are also trying to do lockheed martin. One more question. The fact that the leaks are motivated by politics for sis financial considerations that we collect as part of the process . With more computer auditing . Or how to really get someones perceived loyalty . In the case the snowden i saw some postmortem looking at what he was doing digitally. The warning signs that may have seen the nine there was clearly a pattern is somebody had that entire set of behaviors they may have reached a conclusion something is going on. Need to think across the spectrum the wing from stupid to evil to see what happens when i click on this. Then called the work goes down. Those that will commit treason for many but he was clearly between psychopath in such a bad offenders assist with my view of the world. But the duty is to set the parameters look at the data sets in terms of priority that is in such a big deal and to figure out how to integrate all of that that is very problematic. Said the solution is the technology with that model of what has been done historically. You used the word evil but dont think that you meant that. I hate the phrase connecting the dots that is what were doing. Just because somebody has one or two or three behaviors doesnt mean they have done anything wrong. So i think that is a part of the solution as well. I just want to reinforce what joan just said. Right now, government really doesnt do that sharing with the private sector. If they see red flags about an individual whos a contractor, thaw tend to hold it inside and then the initial investigation whereas the private sector sometimes will have in the future far better insight on employees and contractors and what they represent. Your question is very pertinent. Is there new loyalties today . Are we world citizens versus United States in a western civilization, etc. . We have to have some new selecters that will try to pull out the issues of loyalty. With that, i would like to thank john dempsey, charlie for and thank all of you your good questions and your attendance today. Thank you. Tonight at 9 00 eastern, executives from pandora and spotify on how Technology Impacts the entertainment business from this years aspen forum. Music is not the only thing you want to listen to. So morning commute is one hypothesis that were testing right now is when youre on the subway or in your car, maybe you dont only want music. Maybe you want some news, a weather report. If youre on the subway, not while youre driving like a clip of jimmy fallon or Something Like that. Theres some other contents you want to experience during that period of time and thats kind of the hypothesis were testing right now to see if people are interested in experiencing that. Then sunday evening at 6 30. G. O. P. President ial candidate john kasich at the council on foreign relation, on rebuilding international alliances. 18 years on the House Arms Services committee, i knew many months ago that the only way to solve this problem is to call for an International Coalition to defeat isis in syria and iraq. We have to join with our nato allies and with other allies in the nation to organize an International Coalition to defeat isis on the ground and